This talk will discuss and give real world examples of deploying deception techniques to trick attackers into revealing their presence and intentions. The talk will focus on outing attackers at the earliest stages of an engagement, focusing first on using deception to detect and confuse OSINT gathering and attacks against external systems. We will then pivot to deploying simple deception objects on your internal network to detect compromises as early as possible. We will discuss using an attacker's methods and tools against themselves, giving an attacker the sort of data they hope for, only to use it to trigger alerts and shut them down. Lay down some traps, troll the attackers, make them swear and kick puppies.